Skip to main content
Erschienen in: Wireless Personal Communications 2/2020

19.06.2020

PPSTS: Privacy Preservation in Geographical Data by Spatio-Temporal Shifting Using Elliptic Curve Cryptography

verfasst von: Nikhil B. Khandare

Erschienen in: Wireless Personal Communications | Ausgabe 2/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Footprints of an individual moving around on the surface of earth with location enabled handheld device are saved and can be accessed by him anytime using his credentials. This data is very sensitive and should be handled in very secure way. This data may reveal huge information about an individual like office address, home address, behavior pattern, daily schedule to name a few. Taking into consideration the sensitivity of the information, highest level of security is required for storing, retrieving and sending it. To achieve this level of security this paper proposes way of encrypting this historical geographical data, the proposed work is divided into three modules. Firstly, individually identifiable information is removed from the data, secondly latitude and longitude coordinates in source and destination are shifted and finally temporal aspects of geographical data are shifted. Three modules of proposed work were implemented in QGIS software and identity, time and location were encrypted.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Longley, P. A., et al. (2005). Geographic information systems and science. New York: Wiley. Longley, P. A., et al. (2005). Geographic information systems and science. New York: Wiley.
2.
Zurück zum Zitat Washington, L. C. (2003). Elliptic curves: Number theory and cryptography. New York: Chapman and Hall/CRC.MATH Washington, L. C. (2003). Elliptic curves: Number theory and cryptography. New York: Chapman and Hall/CRC.MATH
3.
Zurück zum Zitat Chandy, K. M., & Lamport, L. (1985). Distributed snapshots: Determining global states of distributed systems. ACM Transactions on Computer Systems (TOCS), 3(1), 63–75. Chandy, K. M., & Lamport, L. (1985). Distributed snapshots: Determining global states of distributed systems. ACM Transactions on Computer Systems (TOCS), 3(1), 63–75.
4.
Zurück zum Zitat Stallings, W. (2006). Cryptography and network security, 4/E. Bengaluru: Pearson Education India. Stallings, W. (2006). Cryptography and network security, 4/E. Bengaluru: Pearson Education India.
5.
Zurück zum Zitat Diffie, Whitfield, & Hellman, Martin. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.MathSciNetMATH Diffie, Whitfield, & Hellman, Martin. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.MathSciNetMATH
6.
Zurück zum Zitat Koblitz, Neal. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177), 203–209.MathSciNetMATH Koblitz, Neal. (1987). Elliptic curve cryptosystems. Mathematics of computation, 48(177), 203–209.MathSciNetMATH
7.
Zurück zum Zitat Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques. Berlin: Springer. Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques. Berlin: Springer.
8.
Zurück zum Zitat Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications, 90(3), 1331–1354. Ray, S., Biswas, G. P., & Dasgupta, M. (2016). Secure multi-purpose mobile-banking using elliptic curve cryptography. Wireless Personal Communications, 90(3), 1331–1354.
9.
Zurück zum Zitat Lamport, Leslie. (1978). Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7), 558–565.MATH Lamport, Leslie. (1978). Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7), 558–565.MATH
10.
Zurück zum Zitat Niu, B., et al. (2015). Enhancing privacy through caching in location-based services. In 2015 IEEE conference on computer communications (INFOCOM). IEEE. Niu, B., et al. (2015). Enhancing privacy through caching in location-based services. In 2015 IEEE conference on computer communications (INFOCOM). IEEE.
11.
Zurück zum Zitat Peng, Tao, Liu, Qin, & Wang, Guojun. (2017). Enhanced location privacy preserving scheme in location-based services. IEEE Systems Journal, 11(1), 219–230. Peng, Tao, Liu, Qin, & Wang, Guojun. (2017). Enhanced location privacy preserving scheme in location-based services. IEEE Systems Journal, 11(1), 219–230.
12.
Zurück zum Zitat Sun, G., et al. (2017). Efficient location privacy algorithm for Internet of Things (IoT) services and applications. Journal of Network and Computer Applications, 89, 3–13. Sun, G., et al. (2017). Efficient location privacy algorithm for Internet of Things (IoT) services and applications. Journal of Network and Computer Applications, 89, 3–13.
13.
Zurück zum Zitat Liang, Y., et al. (2017). Location privacy leakage through sensory data. In Security and communication networks. Liang, Y., et al. (2017). Location privacy leakage through sensory data. In Security and communication networks.
14.
Zurück zum Zitat Sun, G., et al. (2017). L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 74, 375–384. Sun, G., et al. (2017). L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 74, 375–384.
15.
Zurück zum Zitat Memon, Imran. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600. Memon, Imran. (2015). Authentication user’s privacy: An integrating location privacy protection algorithm for secure moving objects in location based services. Wireless Personal Communications, 82(3), 1585–1600.
16.
Zurück zum Zitat Sun, G., et al. (2017). User-defined privacy location-sharing system in mobile online social networks. Journal of Network and Computer Applications, 86, 34–45. Sun, G., et al. (2017). User-defined privacy location-sharing system in mobile online social networks. Journal of Network and Computer Applications, 86, 34–45.
17.
Zurück zum Zitat Corser, George P., Huirong, Fu, & Banihani, Abdelnasser. (2016). Evaluating location privacy in vehicular communications and applications. IEEE Transactions on Intelligent Transportation Systems, 17(9), 2658–2667. Corser, George P., Huirong, Fu, & Banihani, Abdelnasser. (2016). Evaluating location privacy in vehicular communications and applications. IEEE Transactions on Intelligent Transportation Systems, 17(9), 2658–2667.
18.
Zurück zum Zitat Cao, Y., et al. (2019). PriSTE: Protecting spatiotemporal event privacy in continuous location-based services. Proceedings of the VLDB Endowment, 12(12), 1866–1869. Cao, Y., et al. (2019). PriSTE: Protecting spatiotemporal event privacy in continuous location-based services. Proceedings of the VLDB Endowment, 12(12), 1866–1869.
19.
Zurück zum Zitat Yang, M., et al. (2019). A blockchain-based location privacy-preserving crowdsensing system. Future Generation Computer Systems, 94, 408–418. Yang, M., et al. (2019). A blockchain-based location privacy-preserving crowdsensing system. Future Generation Computer Systems, 94, 408–418.
20.
21.
Zurück zum Zitat Kang, J., et al. (2019). MoveWithMe: Location privacy preservation for smartphone users. IEEE Transactions on Information Forensics and Security, 15, 711–724. Kang, J., et al. (2019). MoveWithMe: Location privacy preservation for smartphone users. IEEE Transactions on Information Forensics and Security, 15, 711–724.
22.
Zurück zum Zitat Peng, T., et al. (2019). Multidimensional privacy preservation in location-based services. Future Generation Computer Systems, 93, 312–326. Peng, T., et al. (2019). Multidimensional privacy preservation in location-based services. Future Generation Computer Systems, 93, 312–326.
Metadaten
Titel
PPSTS: Privacy Preservation in Geographical Data by Spatio-Temporal Shifting Using Elliptic Curve Cryptography
verfasst von
Nikhil B. Khandare
Publikationsdatum
19.06.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07604-8

Weitere Artikel der Ausgabe 2/2020

Wireless Personal Communications 2/2020 Zur Ausgabe

Neuer Inhalt